2.1 Event Sources

Sentinel gathers security information and events from many different sources in your IT environment. These sources are called event sources. The event sources can be many different items on your network.

Security Perimeter: Security devices including hardware and software used to create a security perimeter for your environment, such as firewalls, IDS, and VPNs.

Operating Systems: Events from the different operating systems running in the network.

Referential IT Sources: The software used to maintain and track assets, patches, configuration, and vulnerability.

Application Events: Events generated from the applications installed in the network.

User Access Control: Events generated from applications or devices that allow users access to company resources.